Re: [dnsext] Historical root keys: The Large Router Vendor Speaks
Andrew Sullivan <ajs@shinkuro.com> Fri, 28 January 2011 16:33 UTC
Return-Path: <ajs@shinkuro.com>
X-Original-To: dnsext@core3.amsl.com
Delivered-To: dnsext@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B06283A68D9 for <dnsext@core3.amsl.com>; Fri, 28 Jan 2011 08:33:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.266
X-Spam-Level:
X-Spam-Status: No, score=-102.266 tagged_above=-999 required=5 tests=[AWL=0.333, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1UuN6CoyzZji for <dnsext@core3.amsl.com>; Fri, 28 Jan 2011 08:33:53 -0800 (PST)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by core3.amsl.com (Postfix) with ESMTP id BCA7C3A68D2 for <dnsext@ietf.org>; Fri, 28 Jan 2011 08:33:53 -0800 (PST)
Received: from crankycanuck.ca (external.shinkuro.com [66.92.164.104]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id A85DE1ECB426 for <dnsext@ietf.org>; Fri, 28 Jan 2011 16:36:59 +0000 (UTC)
Date: Fri, 28 Jan 2011 11:36:56 -0500
From: Andrew Sullivan <ajs@shinkuro.com>
To: dnsext@ietf.org
Message-ID: <20110128163656.GC30257@shinkuro.com>
References: <4D41D3E2.6060107@cisco.com> <3125F45F-7594-498F-AFA3-D2D738A228F5@hopcount.ca> <4D42ED13.5030000@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <4D42ED13.5030000@cisco.com>
User-Agent: Mutt/1.5.18 (2008-05-17)
Subject: Re: [dnsext] Historical root keys: The Large Router Vendor Speaks
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jan 2011 16:33:54 -0000
No hat. On Fri, Jan 28, 2011 at 11:21:39AM -0500, John Bashinski wrote: > Is there some particular S/MIME or PGP key that's guaranteed to be used > to sign every update in the future > Same question... if I wake up several years from now, is the > root key for that CA going to be the same, or am I going to be > able to trace a path from the key I have to the current key? > > The overriding requirement is that a device be able to choose its trust > anchor with no human intervention, based on information that may be > several years old. That amounts to a requirement that someone guarantee a key is not compromised. Nobody can promise that. This is why I am sceptical of claims that some mechanism other than DNSSEC keys is the right way to do this. I don't see why it's more harmful to say, "Replay the 5011 rollovers as they happened through history," with the possible exposure that one of those was compromised (the compromise being the reason for the rollover, than it is to say, "Trust this key forever." I see no reason to suppose one of those keys more likely to be corrupted than the other, in the case where one is doing regular key rolls. If one is _not_ doing regular key rolls, then things are different. In that case, of course the presence of a mismatch is either an attack or a roll because of compromise. But at that point, it seems to me, one does not want anything automatic. One wants analysis of the situation, no? (Why was the key compromised? What evidence is there that only that key was compromised? &c.) > One thing to remember that may bear on this, by the way: a lot of > these products won't have any security-quality assurance that they > know the date or time even *after* they come up, let alone when > they're first trying to get DNS working. They're going to have a hard time with DNSSEC signatures if they don't have accurate time. > I'm not sure compromise is quite as black and white as you've presented > it, though. In a limited compromise, we might still get more assurance > from relying on the old key for a rollover than from relying on > *nothing* for a rollover. I don't want to put words in Wouter's mouth, but I believe this to be one of the underlying assumptions of the trust-history draft. Indeed, it seems to me that if you have a real compromise, you can just not publish that event in the trust history. A -- Andrew Sullivan ajs@shinkuro.com Shinkuro, Inc.
- Re: [dnsext] Historical root keys: The Large Rout… Phillip Hallam-Baker
- [dnsext] Historical root keys: The Large Router V… John Bashinski
- Re: [dnsext] Historical root keys: The Large Rout… Joe Abley
- Re: [dnsext] Historical root keys: The Large Rout… David Conrad
- Re: [dnsext] Historical root keys: The Large Rout… Brian Dickson
- Re: [dnsext] Historical root keys: The Large Rout… Jakob Schlyter
- Re: [dnsext] Historical root keys: The Large Rout… Florian Weimer
- Re: [dnsext] Historical root keys: The Large Rout… George Barwood
- Re: [dnsext] Historical root keys: The Large Rout… Alex Bligh
- Re: [dnsext] Historical root keys: The Large Rout… John Bashinski
- Re: [dnsext] Historical root keys: The Large Rout… Andrew Sullivan
- Re: [dnsext] Historical root keys: The Large Rout… Joe Abley
- Re: [dnsext] Historical root keys: The Large Rout… John Bashinski
- Re: [dnsext] Historical root keys: The Large Rout… Paul Hoffman
- Re: [dnsext] Historical root keys: The Large Rout… Nicholas Weaver
- Re: [dnsext] Historical root keys: The Large Rout… John Bashinski
- Re: [dnsext] Historical root keys: The Large Rout… Ted Lemon
- Re: [dnsext] Historical root keys: The Large Rout… Alex Bligh
- Re: [dnsext] Historical root keys: The Large Rout… John Bashinski
- Re: [dnsext] Historical root keys: The Large Rout… John Bashinski
- [dnsext] A question about the need for "historica… Edward Lewis
- Re: [dnsext] Historical root keys: The Large Rout… Paul Hoffman
- Re: [dnsext] Historical root keys: The Large Rout… Ted Lemon
- Re: [dnsext] A question about the need for "histo… John Bashinski
- Re: [dnsext] A question about the need for "histo… Ted Lemon
- Re: [dnsext] Historical root keys: The Large Rout… John Bashinski
- Re: [dnsext] A question about the need for "histo… Paul Wouters
- Re: [dnsext] Historical root keys: The Large Rout… Ted Lemon
- Re: [dnsext] Historical root keys: The Large Rout… John Bashinski
- Re: [dnsext] Historical root keys: The Large Rout… Paul Wouters
- Re: [dnsext] Historical root keys: The Large Rout… Thierry Moreau
- Re: [dnsext] Historical root keys: The Large Rout… John Bashinski
- Re: [dnsext] Historical root keys: The Large Rout… Phillip Hallam-Baker
- Re: [dnsext] Historical root keys: The Large Rout… Paul Wouters
- Re: [dnsext] Historical root keys: The Large Rout… Thierry Moreau
- Re: [dnsext] Historical root keys: The Large Rout… Paul Wouters
- Re: [dnsext] Historical root keys: The Large Rout… Phillip Hallam-Baker
- Re: [dnsext] Historical root keys: The Large Rout… Tony Finch
- Re: [dnsext] Historical root keys: The Large Rout… Chris Thompson
- Re: [dnsext] Historical root keys: The Large Rout… George Barwood
- Re: [dnsext] Historical root keys: The Large Rout… Tony Finch
- Re: [dnsext] Historical root keys: The Large Rout… Phillip Hallam-Baker
- Re: [dnsext] Historical root keys: The Large Rout… Olafur Gudmundsson